Across
- 2. program that hides within or looks like a legitimate program.
- 5. program or set of instructions in a program that allow users to bypass security controls.
- 7. _______ software was originally developed to detect and remove computer viruses.
- 9. refers to a group of compromised computers or mobile devices connected to a network.
- 10. ______ provides encryption of all data that passes between client and internet server.
- 11. _______ is a notice that guarantees a user or website is legitimate.
- 12. can be used to protect computers and equipment from electrical power disturbances.
- 13. actions to be taken to restore full information processing operations.
Down
- 1. _______ is a surge protector that provides power during power loss.
- 3. refers to significant increase in electrical power.
- 4. an authorized company that issues and verifies digital certificates.
- 6. online or internet based illegal act.
- 8. ____ copies itself repeatedly, using up resources and possibly shutting down computer/network.
